Home | Amazing | Today | Tags | Publishers | Years | Search 
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Pharmacoethics: A Problem-Based Approach (Plant Engineering Series)
Pharmacoethics: A Problem-Based Approach (Plant Engineering Series)
About 20 years ago, the University of New Mexico School of Medicine (SOM) established a student-centered problem-based learning (PBL) curriculum emphasizing ambulatory care practice competencies. It was designed for small groups of students working together and ran parallel with their more traditional curriculum. The SOM...
Information Retrieval: Searching in the 21st Century
Information Retrieval: Searching in the 21st Century

In the forty years since I started working in the field, and indeed for some years before that (almost since Calvin Mooers coined the term information storage and retrieval in the 1950s), there have been a significant number of books on information retrieval. Even if we ignore the more specialist research monographs and the...

Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

The Complete IS-IS Routing Protocol
The Complete IS-IS Routing Protocol
IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice in some of the world’s largest networks....
GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Internet Fraud Casebook: The World Wide Web of Deceit
Internet Fraud Casebook: The World Wide Web of Deceit

Real case studies on Internet fraud written by real fraud examiners

Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive,...

Plug-in to After Effects: Third Party Plug-in Mastery
Plug-in to After Effects: Third Party Plug-in Mastery

I used to think plug-ins were for people who could afford to buy creativity. Then I realized it was for those who had creativity, but were burdened and held back by the process, or lack of tools, for their creativity. After Effects plug-ins are not someone’s project files or templates for you to copy, but rather tools for...

The ThoughtWorks Anthology, Volume 2: More Essays on Software Technology and Innovation
The ThoughtWorks Anthology, Volume 2: More Essays on Software Technology and Innovation

While many companies are primarily defined by a business model, Thought- Works is primarily defined by a social model. We define three pillars to measure success in our business and to influence our business decisions.

• Run a sustainable business.

• Champion software excellence, and...

Parallel Complexity Theory (Research Notes in Theoretical Computers Science)
Parallel Complexity Theory (Research Notes in Theoretical Computers Science)

Parallel complexity theory, the study of resource-bounded parallel computation, is surely one of the fastest-growing areas of theoretical Computer Science. In the light of this, it would be foolish to attempt an encyclopedic coverage of the field. However, it is the belief of the author that its foundations are becoming increas ingly...

Result Page: 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy